skip to main content
10.1145/2783258.2783271acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Online Influence Maximization

Published:10 August 2015Publication History

ABSTRACT

Social networks are commonly used for marketing purposes. For example, free samples of a product can be given to a few influential social network users (or seed nodes), with the hope that they will convince their friends to buy it. One way to formalize this objective is through the problem of influence maximization (or IM), whose goal is to find the best seed nodes to activate under a fixed budget, so that the number of people who get influenced in the end is maximized. Solutions to IM rely on the influence probability that a user influences another one. However, this probability information may be unavailable or incomplete. In this paper, we study IM in the absence of complete information on influence probability. We call this problem Online Influence Maximization (OIM), since we learn influence probabilities at the same time we run influence campaigns. To solve OIM, we propose a multiple-trial approach, where (1) some seed nodes are selected based on existing influence information; (2) an influence campaign is started with these seed nodes; and (3) user feedback is used to update influence information. We adopt Explore-Exploit strategies, which can select seed nodes using either the current influence probability estimation (exploit), or the confidence bound on the estimation (explore). Any existing IM algorithm can be used in this framework. We also develop an incremental algorithm that can significantly reduce the overhead of handling user feedback information. Our experiments show that our solution is more effective than traditional IM methods on the partial information.

Skip Supplemental Material Section

Supplemental Material

p645.mp4

mp4

148 MB

References

  1. S. Agrawal and N. Goyal. Analysis of thompson sampling for the multi-armed bandit problem. In COLT, 2012.Google ScholarGoogle Scholar
  2. C. Aslay, N. Barbieri, F. Bonchi, and R. A. Baeza-Yates. Online topic-aware influence maximization queries. In EDBT, 2014.Google ScholarGoogle Scholar
  3. P. Auer. Using confidence bounds for exploitation-exploration trade-offs. JMLR, 3:397--422, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Borgs, M. Bratbar, J. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge University Press, 2006. Google ScholarGoogle ScholarCross RefCross Ref
  6. W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In KDD, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Chen, Y. Wang, and Y. Yuan. Combinatorial multi-armed bandit: General framework and applications. In ICML, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In ICDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Domingos and M. Richardson. Mining the network value of customers. In KDD, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In WSDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Goyal, F. Bonchi, and L. V. Lakshmanan. A data-based approach to social influence maximization. PVLDB, 5(1), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Goyal, W. Lu, and L. V. Lakshmanan. CelfGoogle ScholarGoogle Scholar
  14. : Optimizing the greedy algorithm for influence maximization in social networks. In WWW, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Huang, X.-Q. Cheng, H.-W. Shen, T. Zhou, and X. Jin. Exploring social influence via posterior effect of word-of-mouth recommendations. In WSDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Jung, W. Heo, and W. Chen. Irie: Scalable and robust influence maximization in social networks. In ICDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Kim, S.-K. Kim, and H. Yu. Scalable and parallelizable processing of influence maximization for large-scale social networks? In ICDE, 2013.Google ScholarGoogle Scholar
  19. S. Lei, S. Maniu, L. Mo, R. Cheng, and P. Senellart. Online influence maximization (extended version). arXiv:1056.01188, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In KDD, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. J. Lovett, R. Peres, and R. Shachar. On brands and word of mouth. J. Marketing Research, 50(4), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  22. W. Lu, F. Bonchi, A. Goyal, and L. V. Lakshmanan. The bang for the buck: Fair competitive viral marketing from the host perspective. KDD, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Richard and A. Barto. Reinforcement Learning: An Introduction. MIT Press, 1998.Google ScholarGoogle Scholar
  24. M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In KDD 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. H. Robbins. Some aspects of the sequential design of experiments. Bull. Amer. Math. Soc., 58(5), 1952.Google ScholarGoogle Scholar
  26. K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for independent cascade model. In KES, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Y. Singer. How to win friends and influence people, truthfully: influence maximization mechanisms for social networks. In WSDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets practical efficiency. In SIGMOD, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Y. Wang, G. Cong, G. Song, and K. Xie. Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In KDD, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Online Influence Maximization

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '15: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
      August 2015
      2378 pages
      ISBN:9781450336642
      DOI:10.1145/2783258

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 August 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      KDD '15 Paper Acceptance Rate160of819submissions,20%Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader